Exploiting loose comparison operations.
Triggering code execution through object deserialisation.
Exploiting command injection vulnerabilities.
Exploiting common Tomcat vulnerabilities.
Exploiting file upload vulnerabilities to execute arbitrary code.
SQL Injection for MySQL databases.
Exploiting XML parsers.
Identifying web content to launch further attacks.
Injecting malicious code into web applications.
A review of the CBBH course and exam.
Exploiting LFI vulnerabilities in web applications.
Decoding Flask signed session cookies.